Analysis
-
max time kernel
600s -
max time network
591s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/02/2024, 14:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/j61hk74zuboqvve/7DOcgVrSHL8WQaeh.exe/file
Resource
win10v2004-20240221-en
Behavioral task
behavioral2
Sample
https://www.mediafire.com/file/j61hk74zuboqvve/7DOcgVrSHL8WQaeh.exe/file
Resource
win11-20240221-en
General
-
Target
https://www.mediafire.com/file/j61hk74zuboqvve/7DOcgVrSHL8WQaeh.exe/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133533760739485394" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5096 chrome.exe 5096 chrome.exe 3308 chrome.exe 3308 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5096 wrote to memory of 4880 5096 chrome.exe 80 PID 5096 wrote to memory of 4880 5096 chrome.exe 80 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 1544 5096 chrome.exe 83 PID 5096 wrote to memory of 2676 5096 chrome.exe 85 PID 5096 wrote to memory of 2676 5096 chrome.exe 85 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84 PID 5096 wrote to memory of 4356 5096 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/file/j61hk74zuboqvve/7DOcgVrSHL8WQaeh.exe/file1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdb6f99758,0x7ffdb6f99768,0x7ffdb6f997782⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1824,i,6035286033161245669,11608985449607618597,131072 /prefetch:22⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2128 --field-trial-handle=1824,i,6035286033161245669,11608985449607618597,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1824,i,6035286033161245669,11608985449607618597,131072 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3160 --field-trial-handle=1824,i,6035286033161245669,11608985449607618597,131072 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1824,i,6035286033161245669,11608985449607618597,131072 /prefetch:12⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4820 --field-trial-handle=1824,i,6035286033161245669,11608985449607618597,131072 /prefetch:12⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5012 --field-trial-handle=1824,i,6035286033161245669,11608985449607618597,131072 /prefetch:12⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 --field-trial-handle=1824,i,6035286033161245669,11608985449607618597,131072 /prefetch:82⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 --field-trial-handle=1824,i,6035286033161245669,11608985449607618597,131072 /prefetch:82⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=880 --field-trial-handle=1824,i,6035286033161245669,11608985449607618597,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD542ab96ba1df9cfe3fe2f2a37575a59f2
SHA1051e10a3b61a8845c80866cf34e43b7376783f29
SHA256d53c7ae537d16e380e39d72d3692eef14f1fd2cfc0e8d9196894004182b69512
SHA5126fbd26c026f043efd2b7cae86f7a841788dc59e9fb6bf9dbb21189470a93745c4da48797a1383a0b3774c29475a075b71544071ab1cfcbaffe0d018492629e8d
-
Filesize
7KB
MD500ed057889133d012cbbb980c7b7baba
SHA1e215fdeecc406c8d75f0b6e5de8755a04364a51a
SHA256d3b6bde61eec58092e167c0fb3cd858d61980b6b7e39afba1f2dca4fe1749336
SHA512556ba543f8ca3d980ba89202a2e7b6ea0bad2c8efcbaa0c9c79b9bf4364b537cb79847d912270c471cb4ac9dcf836a7f8a6bc207e3a288f186eca2d73388e36f
-
Filesize
1KB
MD5a2aa24516cd521a21e0f8bcb5886a736
SHA12545314ea5d54fa73b3e0e72895202aa97f6adfe
SHA2560201878014f2b9c53d0e9ab1e016d2d0b1bf7895c89e616bd811dbb806fc4cf9
SHA51257ff51e8b2d06726fdb1753ee1594b96e8c12ceefd0d5b905b2cc5e7d31149a9891be4cc43e9e9fbad29eaa7b8c1ba22ba577f75830d155e70e2b819b4b25cbf
-
Filesize
6KB
MD5cf40e40d97c8bf827b91e66c0ab33aaf
SHA13f014857f42b7313fc512bf1a20074b5768901c5
SHA25660cf9e208a27e10b4667ef5e34d249f40615ebb76b53ee826fcd99c2705476a5
SHA5128156ec95153e80dca454f648dc4283c94ea0ad0e0099bb42c1380d4354f56e421afc32e4d06efbe4f6f095ee413840fa4756c3efac9ca9bfde6bb2ffc103d63d
-
Filesize
130KB
MD5d999303f3b6278c97803009989949e9c
SHA1250108eef288f11741063c1d8572a71a45b683c7
SHA256cb6ba8bf090a6b2339a0e1a31a74fe38823695b16339fa245faaf17b8991e41e
SHA512352472aa2d987c6cf2789492d1c864dbcbc0d1c34a3e5de2bf07073e83426805341dcbffee9d298eacd15d76e78d065a63ed09051812882964d30a89758bed53
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd